• Aucun résultat trouvé

A Dynamic Random Graph Model for Diameter-Constrained Topologies in Networked Systems

N/A
N/A
Protected

Academic year: 2021

Partager "A Dynamic Random Graph Model for Diameter-Constrained Topologies in Networked Systems"

Copied!
6
0
0

Texte intégral

(1)

HAL Id: hal-01228346

https://hal.archives-ouvertes.fr/hal-01228346

Submitted on 16 Nov 2015

HAL is a multi-disciplinary open access archive for the deposit and dissemination of sci- entific research documents, whether they are pub- lished or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers.

L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.

A Dynamic Random Graph Model for

Diameter-Constrained Topologies in Networked Systems

Luigi Alfredo Grieco, Mahdi Ben Alaya, Thierry Monteil, Khalil Drira

To cite this version:

Luigi Alfredo Grieco, Mahdi Ben Alaya, Thierry Monteil, Khalil Drira. A Dynamic Random Graph

Model for Diameter-Constrained Topologies in Networked Systems. IEEE Transactions on Circuits

and Systems II: Express Briefs, Institute of Electrical and Electronics Engineers, 2014, 61 (12), pp.882-

886. �10.1109/TCSII.2014.2362676�. �hal-01228346�

(2)

A Dynamic Model for Diameter Constrained Networked Systems

Luigi Alfredo Grieco, Senior Member, IEEE, Mahdi Ben Alaya, Thierry Monteil, and Khalil Drira

Abstract—Random graphs have been widely investigated in literature because of their relevance to many scientific domains.

In this brief, the attention is focused on diameter constrained random graphs, useful to analyze unstructured overlays for delay bounded network applications and systems. To this end, a general process of arrivals is considered to describe the sequence of vertex couples (i.e., node couples) among which a path composed of no more than D edges (i.e., links) has to be established. Accordingly, a topology formation mechanism M is formulated, expressing the rules that drive the addition of new edges, obeying to the constraint on the maximum diameter D. Third, using graph theoretic arguments, an original discrete time model is proposed that describes the evolution of the average network degree (i.e., the number of edges per node) subject to M and D. Fourth, the model is successfully validated using computer simulations in a wide range of scenarios (with up to 2

16

nodes). Finally, concrete examples are provided to illustrate useful applications of the proposed approach, also in the presence of link failures.

Index Terms—Graph theory, Topology, Networks, Overlay.

I. I NTRODUCTION

Graph-based models are fundamental tools to assess, pre- dict, and control the performance of complex systems, made of interacting dynamic units. In these systems, vertice are usu- ally associated to the dynamic units whereas edges represent interactions. The application domains of graph-based models include coupled biological/chemical systems, social networks, software applications, and communication protocols [1]–[3].

In many real systems, unfortunately, the properties of their interacting units cannot be deterministically known in advance.

In these cases, random graphs [4] can be fruitfully used to infer the characteristics of the topology, based on the probabilistic behavior of vertice and edges (see also [5] for a comprehensive overview on the subject).

With reference to communication issues, random graphs have been mainly adopted to describe unstructured overlays [6]–[8], web properties [9], and Internet topology [10].

In this brief, we focus on diameter constrained overlays, i.e., virtual network topologies having a diameter no larger than a predefined threshold D. This kind of overlay is very useful to support delay sensitive applications, such as in Peer- to-Peer (P2P) TV [11] and emerging Machine-to-Machine (M2M) systems [12]. In fact, the higher the diameter D the higher the end-to-end communication delay [13]. The problem of building diameter constrained graphs has been thoroughly

L. A. Grieco is with the Department of Electrical and Information Engi- neering, Politecnico di Bari, Bari, Italy, e-mail: a.grieco@poliba.it

M. B. Alaya and T. Monteil are with CNRS, LAAS, and Univ. de Toulouse, Toulouse, France. K. Drira is with CNRS, LAAS, Toulouse, France. e-mail:

{ben.alaya, monteil, khalil}@laas.fr

afforded in [14] with reference to structured overlays, built upon distributed hash tables (DHT). Unfortunately, to the best of the authors’ knowledge, no theoretical contribution has been formulated yet, able to describe with closed form expressions the dynamics of an unstructured evolving overlay, subject to a constraint of the maximum diameter D. This kind of model could be very useful to enable closed loop autonomic management strategies as well as to characterize, in a tractable form, both transient and steady state properties of network topologies in M2M scenarios [12], [15] and beyond.

Starting from this premise, a theoretical model based on random graph is formulated herein, which considers a discrete time process of arrivals to describe the sequence of vertex couples among which a path composed of no more than D edges has to be established. Accordingly, a general topology formation mechanism M is formulated, expressing the rules that drive the addition of new edges, obeying to the constraint on the maximum diameter D. Then, exploiting the properties of the binary adjacency matrix A in graph theory [16], an original and tractable discrete time model is proposed that describes the evolution of the average network degree (i.e., the number of edges per node) subject to M and D. The model is successfully validated using computer simulations in a wide range of scenarios (with up to 2

16

nodes). Finally, concrete examples are provided to illustrate useful applications of the proposed approach. They include: (i) the derivation of an approximated upper bound

D

2 · N · lnN on graph average degree (i.e., the average number of edges per vertex);

(ii) the comparison with respect to delay optimal de Bruijn graphs [14]; (iii) the analysis of the graph robustness; (iv) the derivation of system dynamics in presence of edge failures.

The rest of the brief is organized as follows: the main theoretical achievement is presented in Sec. II and validated in Sec. III. Useful examples of its applications are described in Sec. IV. The last Sec. V closes the brief and draws future research.

II. M ODEL

A. Target Scenario and Notation

The target scenario considered in this brief consists of a graph of N vertice, n

q

being the q-th vertix (q [1, N ]).

Furthermore, an ordered sequence of equi-probable

1

couples

1

It is worth to note that equi-probable arrivals (i.e., homogeneous con-

ditions) are usually assumed in the current literature dealing with diameter

constrained graphs [14]. In fact, if the vertice of the graph represent the

gateway through which the service of a large number of nodes are made

available (as in M2M systems [17]), it is not unlikely that the overlay that

inter-connect such gateways actually reflects this assumption.

(3)

of vertice is considered, among which a path composed of no more than D edges has to be established. The t-th couple is described by the vertice (n

it

, n

jt

). For sake of simplicity, the variable t will be referred to as time from now on.

Knowing the t-th couple, a new edge is established in the graph if and only if the two vertice (n

it

, n

jt

) are not reciprocally reachable in no more than D edges. Knowing, the number of edges l

t−1

at time t 1, the probability that a couple of vertice at time t will not be reciprocally reachable in no more than D edges is defined as P

t−1

. Notice that, since we are assuming homogeneous conditions, P

t−1

is the same for all the possible couples (n

it

, n

jt

).

Accordingly, our model is grounded on the following equa- tion:

l

t+1

= l

t

+ P

t

(1) which, considering that the average degree [4] (i.e., the number of edges per vertex) is k

t

=

2N·lt

, can be also expressed as:

k

t+1

= k

t

+ 2

N P

t

(2)

The presence of an edge between any couple of vertice at time t will be expressed (as usual in graph theory) using the binary symmetric adjacency matrix A

N xNt

, so that A

t

(i, j) = A

t

(j, i) = 1 if and only if an edge between n

i

and n

j

exists at time t (otherwise A

t

(i, j) = A

t

(j, i) = 0).

TABLE I N

OTATION

.

Symbol Meaning

N Number of vertice k

t

Average degree at time t n

q

q-th vertex

D Maximum diameter

(n

it

, n

jt

) t-th couple of vertice wishing to establish a path l

t

Number of edges at time t

w

t

Number of path with less than D + 1 edges between a couple of vertice at time t

P

t−1

Probability that no path exists shorter than D+1 edges between the vertice (n

it

, n

jt

)

A

N xNt

Symmetric binary adjacency matrix at time t P r { x } Probability of event x

ˆ

x Upper bound on x

To provide an illustrative example of the networked system we are modeling as a random graph, Fig. 1 shows the evolution of a graph made of N = 5 vertice and constrained by D = 2 max path length. In this example, the ordered sequence of vertice (n

it

, n

jt

) is: (n

2

, n

4

), (n

1

, n

4

), (n

1

, n

2

), (n

4

, n

5

), (n

2

, n

3

), and (n

1

, n

3

). Accordingly, for each of them, a new edge is added if and only if a path shorter than 3 edges is not already available among corresponding vertice. In the sequel of the contribution, we will derive a law that rule the evolution of this kind of graphs in a general case.

n1 n2

n3

n4 n5

t = 0 (a)

n1 n2

n3

n4 n5

t = 1 (b)

n1 n2

n3

n4 n5

t = 2 t = 3 (c)

n1 n2

n3

n4 n5

t = 4

(d)

n1 n2

n3

n4 n5

t = 5

(e)

n1 n2

n3

n4 n5

t = 6

(f)

Fig. 1. Evolution of a random graph (N = 5, D = 2): a) initial state; b) the first edge is added at t = 1 to connect vertice n

2

and n

4

; c) the second edge is added at t = 2 to connect vertice n

1

and n

4

, but no edge is added at t = 3 because the vertice n

1

and n

2

(asking for a connection) are already connected by a path of 2 hops D; d) the third edge is added at t = 4 to connect vertice n

4

and n

5

; e) the fourth edge is added at t = 5 to connect vertice n

2

and n

3

; e) the fifth edge is added at t = 6 to connect vertice n

1

and n

3

, for which the only existing path was longer than D hops.

B. Main result

Proposition 1. For a sufficiently large N , the following ex- pression describes the dynamics of the average graph degree:

k

t+1

k

t

+ 2 N · exp

(

1

N · k

D+1t

k

t

k

t

1

)

(3) Proof. The model considered here is based on Eq. (1), or equivalently on finding an accurate approximation for the probability P

t

. The latter expresses the probability to find a path at time t (no longer than D edges) between a generic couple of vertice (n

it+1

, n

jt+1

), knowing that the number of already existing edges is l

t

.

To fulfill this objective, we first leverage a well known property of the matrix A

t

: A

ct

(i, j) = 0, c N

+

, if and only if no path composed of c edges exist between n

i

and n

j

at time t [16].

In this way, without lack of generality, P

t

can be expressed as follows:

P

t

=

D

c=1

P r { A

ct

(i

t+1

, j

t+1

) = 0 } (4) Now, given that 2 · l

t

elements are equal to one in A

t

, it yields P r { A

t

(i, j) = 1 } =

2N·l2t

. Also, since any element of A

ct

is no other than the sum of N

c1

elements, each one being a product of c coefficients belonging to A

t

, we can approximately write:

P r { A

ct

(i

t+1

, j

t+1

) = 0 } ≈ [

1 ( 2 · l

t

N

2

)

c

]

Nc−1

(5)

(4)

Now, recalling that (1 +

1x

)

x

e, when x → ∞ , for a sufficiently large N , Eq. (5) can be written as:

P r { A

ct

(i

t+1

, j

t+1

) = 0 } ≈ exp (

N

c1

· ( 2 · l

t

N

2

)

c

)

(6) Accordingly, by substituting (6) in (4), it is obtained:

P

t

exp (

D

c=1

N

c1

· ( 2 · l

t

N

2

)

c

)

(7) which, after a little algebra, becomes

P

t

exp (

1

N · (

2N·lt

)

D+1

2N·lt

2·lt N

1

)

(8) From [4], the average degree can be expressed as k

t

=

2N·lt

, so that we obtain the proof by substituting (8) in (2).

III. N UMERICAL V ALIDATION

To validate the model (3), we have considered a complex scenario composed of N vertice (with N ranging from 2

5

to 2

16

) and D ranging from 3 to 10. Using an ad hoc simulator we developed in Matlab, the relative error between the real evolution of the degree k(t) and the one estimated using (3) for all t is evaluated. In any case, we found that the average relative error is below 10% if we consider the entire evolution of k(t). Also, the relative error at steady state (once the graph is completely formed), for D 5, is below 10%, whatever N . Finally, we notice a slight increase in the relative error as D increases: (in any case) it remains smaller than 25% and it falls below 20% for N > 2

12

.

To provide an illustrative example, Fig. 2 plots the dynamic evolution of the number of edges versus the time t (similar results have been obtained for different values of N and D so that the average relative error is below 10% in all cases).

100 101 102 103 104 105

100 101 102 103 104

t

Number of Edges

Estimated x Real

x

x

x

x

Fig. 2. Evolution of the number of edges over the time t, (N = 1000, D = 5).

It is worth to note that the number of edges linearly increases with t till a saturation point is reached. From that moment on, l exhibits a very slow rise. This can be explained by plotting also the values of the probability P

t

. Fig. 3 shows that P

t

is almost equal to one for some time during the network formation, meaning that, since the number of edges is low, it is highly likely to add a new edge as soon as a new couple of nodes needs to establish a path. At the same time, the values

Algorithm 1 Validation Code

procedure S IMULATE G RAPH F ORMATION (N ,D,stop) stop: stop condition

l(0) 0 Initial number of edges est

l

(0) 0 Estimated initial number of edges counter 0 Counter initial value A 0

N xN

Adjacency matrix initial value while !stop do The procedure is run until the stop condition is verified

i randi(N ) An integer random number between 1 and N is assigned to i

j randi(N ) if i ̸ = j then

counter counter + 1

est

l

(counter) est

l

(counter) + P

counter

d shortestpath(A, i, j)◃ d is the length of the shortest path from n

i

to n

j

if d < D + 1 then A(i, j) 1;

l(counter) l(counter 1) + 1 else

l(counter) l(counter 1) end if

end if end while end procedure

of P

t

abruptly decreases after a certain t, meaning that the topology reached the steady state.

100 101 102 103 104 105

10-3 10-2 10-1 100

t

Pt

Fig. 3. Evolution of P

t

, (N = 1000, D = 5).

To provide a further insight, Fig. 4 pictures the evolution of a random graph (N = 1000, D = 5): (a) at the beginning of the simulation, when no edge is present; (b) during the transient, when a few edges have been created and a new edge is added; and (c) at steady state, when all required paths (no longer than D edges) have been already created.

IV. E XAMPLE A PPLICATIONS

A. Rank bound and convergence

Theorem 1. Being ˆ k the maximum degree k in system (3), it can be bounded as follows:

ˆ k

D

2 · N · lnN . (9)

(5)

(a)

(b)

(c)

Fig. 4. Evolution of a random graph (N = 1000, D = 5): a) initial state; b) during the transient a new edge is added; c) at steady state no edge is added because paths no longer than D hops already exist.

Proof. The way we are building the overlay is so that an edge between a couple of vertice (n

it

, n

jt

) is formed or not based only upon the first time that couple issues a request for a path.

If a path shorter than D + 1 hops already exists the edge is not established otherwise it is established. From that moment on, the next requests for a path issued by the same couple of vertice will not sort any effect.

Based on this consideration, we extract from the sequence of equi-probable couples of vertice considered in the brief, the sequence of instants in which any couple of vertice appears for the first time. Of course, the length of such a sequence of time instants will be composed of at most N(N 1)/2 elements.

In order to estimate an upper bound on the steady state average degree ˆ k, it is necessary to consider that at time t, 1/P

t

expresses the average time required to establish the next edge in the overlay.

Under this assumption, the expression of P

t

to consider is slightly different from that in Eq. (8) because the sequence of vertix couples we are considering to proof this Theorem is chosen in such a way that no one edge path exists at time t for (n

it

, n

jt

). The avoid ambiguity, we will refer to P

t

to refer to this new probability. Accordingly, it follows:

P

t

=

D

c=2

P r { A

ct

(i

t+1

, j

t+1

) = 0 } (10) which, following the same passages reported in the proof of Proposition 1, can be also written as:

P

t

exp (

1

N · (

2N·lt

)

D+1

(

2N·lt

)

2

2·lt N

1

)

(11) Therefore to estimate an approximated upper bound on ˆ k, it is sufficient to find any value of k

t

so that

P1

t

N (N 1)/2, which gives ∑

c=2

D

k

tc

2 · N · lnN N · ln2. Notice that the latter inequality is satisfied if k

Dt

2 · N · lnN, from which the proof follows.

Remark 1. It is worth remarking that, the bound k ˆ can be fruitfully exploited to compare the properties of the graph under study with respect to well known graph. To this end, if we consider as ground for comparison the delay optimal de Bruijn graphs, representing one of the most compact topologies discovered so far [14], we will find that, for the same diameter D, the degree of the unstructured overlay considered in this brief is only

D

2 · lnN times larger at most, even if it is based on a much simpler construction mechanism.

B. Robustness

Knowing that the graph construction model adopted herein

ensures, at steady state, at least one path shorter than D + 1

edges between any couple of nodes, it is worth investigating

how many paths (composed of less than D + 1 edges) are

present between any couple of nodes. This metric is intimately

related to the topology robustness: the higher the number of

(6)

paths the higher the number of alternative solutions to route messages in case of failures.

Theorem 2. Defined as w

t

the number of paths composed of less than D + 1 edges between any couple of nodes at time t, it holds:

w

t

= 1

N · k

D+1t

k

t

k

t

1 (12)

Proof. Also in this case the properties of the adjacency matrix are exploited. In particular, A

ct

(i, j) indicates the number of paths composed of c edges between the vertice n

i

and n

j

. Thus, considering that the average value of any element if A is

2N·l2t

, it holds:

w

t

= 1 N ·

D

s=1

k

st

= 1

N · k

D+1t

k

t

k

t

1 (13) This end the proof.

Based of this Theorem, we can derive an approximate assessment of the level of redundancy, if we consider for k

t

, the bound derived in Theorem 2, i.e., k

t

=

D

2 · N · lnN.

Under this assumption, we can obtain:

ˆ w = 1

N · (2 · N · lnN)

D+1D

2 · N · lnN

2 · N · lnN 1 > 2 · lnN (14) This result indicates that the overlay investigated in this brief is able to provide at steady state at least two paths among any couple of vertice, for N > e.

C. Link failures

To include also possible link failures and dynamics in the model, it is necessary to modify Eq. (1) as follows:

l

t+1

= l

t

+ P

t

λ

o

· l

t

(15) where λ

o

is the probability that an edge is removed during one time step. The resulting equations could be very useful to design topology management algorithms using control the- oretic arguments. Its utility in finding the uniquness of the equilibrium point is shown in the following Theorem.

Theorem 3. The system (15) admits one and only one equi- librium point l = l

.

Proof. In order to find the equilibrium point of system (15), we impose l

t+1

= l

t

= l

in (15). Accordingly, the following equality is obtained:

P

= λ

o

· l

(16)

Eq. (16) admits only one solution because its leftmost mem- ber monotonically decreases with l, starting from the value one at l = 0 whereas the rightmost member monotonically increases, starting from zero at l = 0.

This ends the proof.

V. C ONCLUSION

A novel tractable model for describing the dynamics of a diameter constrained random graph is proposed, validated, and analyzed in this brief. Useful examples of its adoption have been also provided in order to demonstrate its real utility. Future research will encompass: (i) the evaluation of gravity based features and heterogeneous conditions; (ii) the characterization of M2M overlays; (iii) the study of the properties of the equilibrium point found in Theorem 3; and (iv) the formulation of a control theoretic framework for overlay topologies built upon the model proposed herein.

A CKNOWLEDGMENTS

This work was supported by the INSA of Toulouse (FR).

R EFERENCES

[1] S. Boccaletti, V. Latora, Y. Moreno, M. Chavez, and D.-U. Hwanga,

“Complex networks: Structure and dynamics,” PHYSICS REPORTS, vol.

424, no. 4-5, pp. 175–308, 2006.

[2] M. Babaei, H. Ghassemieh, and M. Jalili, “Cascading failure tolerance of modular small-world networks,” IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 58, no. 8, pp. 527–531, Aug 2011.

[3] Y. Chen, W. Yu, F. Li, and S. Feng, “Synchronization of complex networks with impulsive control and disconnected topology,” IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 60, no. 5, pp. 292–296, May 2013.

[4] P. Erdos and A. Renyi, “On the evolution of random graphs,” Mat Kutato Int. Kozl, vol. 5, no. 17, pp. 17–60, 1960.

[5] M. E. J. Newman, S. H. Strogatz, and D. J. Watts, “Random graphs with arbitrary degree distributions and their applications,” PHYSICAL REVIEW E, vol. 64, 2001.

[6] L. Massoulie, A.-M. Kermarrec, and A. J. Ganesh, “Network awareness and failure resilience in self-organising overlay networks,” in 22nd IEEE Int. Symposium on Reliable Distributed Systems, 2003.

[7] T. Bonald, L. Massoulie, F. Mathieu, D. Perino, and A. Twigg, “Epi- demic live streaming: Optimal performance trade-offs,” in SIGMET- RICS. ACM, 2008.

[8] R. J. Lobb, A. P. C. da Silva, E. Leonardi, M. Mellia, and M. Meo,

“Adaptive overlay topology for mesh-based P2P-TV systems,” in NOSS- DAV. ACM, 2009.

[9] W. Aiello, F. Chung, and L. Lu, “A random graph model for massive graphs,” in 32nd ACM Symposium on Theory of Computing. ACM, 2000.

[10] H. Reittu and I. Norros, “On the power-law random graph model of massive data networks,” Performance Evaluation, vol. 55, pp. 3–23, 2004.

[11] P. Veglia and D. Rossi, “Performance evaluation of P2P-TV diffusion algotihms under realistic settings,” Peer-to-Peer Networking and Appli- cation, 2013.

[12] L. A. Grieco, M. B. Alaya, T. Monteil, and K. Drira, “Architecting information centric ETSI-M2M systems,” in Proc. of IEEE PerCom, 2014.

[13] J. Kurose and K. Ross, Computer Networking: A Top-Down Approach.

Pearson Education, Limited, 2012.

[14] D. Loguinov, J. Casas, and X. Wang, “Graph-theoretic analysis of structured peer-to-peer systems: Routing distances and fault resilience,”

IEEE Transactions on Networking, vol. 13, no. 5, 2005.

[15] M. B. Alaya, S. Matoussi, T. Monteil, and K. Drira, “Autonomic com- puting system for self-management of machine-to-machine networks,” in Proceedings of the 2012 international workshop on Self-aware internet of things, ser. Self-IoT ’12. ACM, 2012, pp. 25–30.

[16] S. Noel and S. Jajodia, “Understanding complex network attack graphs through clustered adjacency matrices,” in 21st IEEE Annual Computer Security Applications Conference, 2005.

[17] A. Dhraief, A. Belghith, K. Drira, T. Bouali, and M. A. Ghorbali,

“Autonomic management of the HIP-based M2M overlay network,”

Procedia Computer Science, vol. 19, no. 0, pp. 98 – 105, 2013.

Références

Documents relatifs

Two recent papers in Physical Review E by Callaway, Hopcroft, Kleinberg, Newman, and Strogatz, and Dorogovstev, Mendes, and Samukhin have computed the critical value of this

It is based on a Markovian latent space dynamic: consecutive latent points are sampled on the Euclidean Sphere using an unknown Markov kernel; and two nodes are connected with a

There is a constant ε ∈]0; 1[ such that if two trees sampled accord- ing to P [h] n have a unique spine decomposition up to height r, then the probability that they are isomorphic

L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des

We use the finite Markov chain embedding technique to obtain the distribution of the number of cycles in the breakpoint graph of a random uniform signed permutation.. This further

Thus, a directed graph is said to be edge-weak (resp. node-weak) if there exists a capacity (resp. charge) assignment to edges (resp. nodes) such that the resulting flow network

In the context of graph databases, a Graph Database Model is a model where data structures for the schema and/or instances are modeled as graphs (or generalizations of them), the

However, the visualization of time-varying ontologies has not received any attention in all these approaches. Although the evolution of ontologies has been subject to